IDENTIFYING RISKS, RESPONSE AND RECOVERY 2
Identifying Risks, Response and RecoveryI previously identified several types of attacks, threats and vulnerabilities that exist with your multilayered network. I have now been charged with the responsibility of developing a strategy to deal with these risks as well as a plan to mitigate each risk to reduce the impact that each will have on your organization.

Your firewall, which is your first line of defense, is susceptible to two common types of attacks. First there are attacks against the firewall itself with the purpose of the attacker being to take control of the firewalls functionality and then launching a DoS attack. The second type of attack against firewalls is an attack on the LAN side of the firewall. These attacks circumvent the rules and policies of the firewall to gain access to the devices that are supposed to be protected by the firewall. The largest vulnerability that exists with firewalls is improper configuration settings. This can lead to the development of security holes which allow unauthorized access from both outside and within your network. All of the aforementioned attacks, threat and vulnerabilities can be mitigated and or avoided altogether. There are several keys to ensuring that your firewall is as secure as possible. Use a VPN for all non-public traffic. Ports on your firewall should only be open for services that are utilized by the public. Because most people have dynamic IP addresses, your firewall has to constantly open ports and modify its rules to allow access, this can lead to ports being left open and vulnerable to attacks. Limit the size of your network. Simply put, if you don’t need it, turn it off. If your servers are not running a service that is used by the public, don’t allow it...

YOU MAY ALSO FIND THESE DOCUMENTS HELPFUL

...﻿
Identifying Potential Risk 1
Assignment 1: Identifying Potential Risk, Response, and Recovery
CIS333
Identifying Potential Risk 2
In this paper I have just been hired as an Information Security Engineer for a video game development company. I have previously identified all of the potential Threats, Vulnerabilities and Malicious...

...﻿
Identifying Potential Risk, Response, and Recovery
Maria A. Tisdale
Strayer University
CIS 333
Professor Robert Whale
December 1, 2014
Identifying Potential Risk, Response, and Recovery
The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls...

...Riskresponses are the defining actions taken during the course of the project that seek to accept, avoid, mitigate, transfer or defer the identified risk. The implementation of riskresponse plans should ultimately lead to the optimization of the projects success.
Which aspects or areas of a project plan are more likely to be affected by riskresponses? How do risk...

...8-1
Understand the aspects of disaster recovery Disaster recovery is concerned with the recovery of critical systems in the event of a loss. Be able to discuss the process of recovering a system in the event of a failure A system recovery usually involves restoring the base operating systems, applications, and data files. Be able to discuss the types of alternative sites available for disaster recovery. The three types...

...Running Head: IDENTIFYING POTENTIAL RISK, RESPONSE AND RECOVERY
Assignment 2-Identifying potential risk, response and recovery
CIS 333 Section 107 VA016
February 24, 2011
With operating a business, there are good and bad things that can go wrong. There are you can get robbed by outsiders, your employees can steal from you and your...

...HURRICANE IKE RECOVERYRESPONSE
Hurricane Ike was the third most destructive hurricane to make landfall in U.S. history with an estimated $22 billion in damages to Texas. Ike’s damage started September 12, 2008 with a 12 foot storm surge flooding 75% of Galveston Island and made landfall September 13. Hurricane Ike sustained winds (110mph) were considered a Category Two, only being one mile per hour from a Category Three (111mph). Ike’s storm surge was...

...﻿Risk is part of life : I face countless danger everyday driving to work. sure I can try minimize many of them through my own driving behavior . but I can’t prevent motorist behind me who is talking on his mobile from rear-ending me while I’m waiting at a stoplight. As much as we would have it otherwise, risk is part of life. Some risks can be averted by steering clear of them. Many are, however, unavoidable.
False sense of security Sometimes you...